lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 5 Jan 2024 20:15:14 -0800
From: Eyal Birger <eyal.birger@...il.com>
To: Jakub Kicinski <kuba@...nel.org>
Cc: Jamal Hadi Salim <jhs@...atatu.com>, Stephen Hemminger <stephen@...workplumber.org>, netdev@...r.kernel.org, 
	Florian Westphal <fw@...len.de>, victor@...atatu.com
Subject: Re: [PATCH iproute2-next v2] remove support for iptables action

On Fri, Jan 5, 2024 at 6:09 AM Jakub Kicinski <kuba@...nel.org> wrote:
>
> On Fri, 5 Jan 2024 06:20:10 -0500 Jamal Hadi Salim wrote:
> > > I tested and it looks like the patch doesn't affect em_ipt, as expected.
>
> Thank you!
>
> > > I did however run into a related issue while testing - seems that
> > > using the old "ingress" qdisc - that em_ipt iproute2 code still uses -
> > > isn't working, i.e:
> > >
> > > $ tc qdisc add dev ipsec1 ingress
> > > Error: Egress block dev insert failed.
> > >
> > > This seems to originate from recent commit 913b47d3424e
> > > ("net/sched: Introduce tc block netdev tracking infra").
> > >
> > > When I disabled that code in my build I was able to use em_ipt
> > > as expected.
> >
> > Resolved in: https://lore.kernel.org/netdev/20240104125844.1522062-1-jiri@resnulli.us/
> > Eyal, if you have cycles please give it a try. Jakub, can we get that applied?
>
> FTR it was applied by Dave soon after you asked.

Verified. With current net-next the problem doesn't happen anymore.

Thanks!
Eyal.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ